2018-03-16 11:40:37 +01:00
|
|
|
import base64
|
|
|
|
import math
|
2018-03-19 18:11:50 +01:00
|
|
|
import os
|
2018-03-19 16:39:08 +01:00
|
|
|
import FPE
|
2018-03-19 20:51:26 +01:00
|
|
|
import time
|
|
|
|
import atexit
|
|
|
|
import cPickle
|
2018-03-16 11:40:37 +01:00
|
|
|
from cryptography.hazmat.primitives import hashes
|
|
|
|
from cryptography.hazmat.backends import default_backend
|
|
|
|
from cryptography.hazmat.primitives import serialization
|
2018-03-19 18:11:50 +01:00
|
|
|
from cryptography.hazmat.primitives.serialization import load_der_public_key
|
|
|
|
from cryptography.hazmat.primitives.serialization import load_der_private_key
|
2018-03-16 11:40:37 +01:00
|
|
|
from cryptography.hazmat.primitives.asymmetric import rsa
|
|
|
|
from cryptography.hazmat.primitives.asymmetric import padding
|
2018-03-16 10:50:37 +01:00
|
|
|
|
|
|
|
class Identity:
|
|
|
|
# Configure key size
|
|
|
|
KEYSIZE = 1536;
|
2018-03-19 18:11:50 +01:00
|
|
|
DERKEYSIZE = 1808;
|
2018-03-16 10:50:37 +01:00
|
|
|
|
|
|
|
# Padding size, not configurable
|
2018-03-16 11:40:37 +01:00
|
|
|
PADDINGSIZE= 336;
|
|
|
|
|
2018-03-19 18:11:50 +01:00
|
|
|
# Storage
|
2018-03-19 20:51:26 +01:00
|
|
|
known_destinations = {}
|
2018-03-19 18:11:50 +01:00
|
|
|
|
2018-03-19 20:51:26 +01:00
|
|
|
def __init__(self,public_only=False):
|
2018-03-16 11:40:37 +01:00
|
|
|
# Initialize keys to none
|
|
|
|
self.prv = None
|
|
|
|
self.pub = None
|
|
|
|
self.prv_bytes = None
|
|
|
|
self.pub_bytes = None
|
|
|
|
self.hash = None
|
|
|
|
self.hexhash = None
|
|
|
|
|
2018-03-19 20:51:26 +01:00
|
|
|
if not public_only:
|
|
|
|
self.createKeys()
|
2018-03-16 11:40:37 +01:00
|
|
|
|
|
|
|
@staticmethod
|
2018-03-20 12:32:41 +01:00
|
|
|
def remember(packet_hash, destination_hash, public_key, app_data = None):
|
|
|
|
FPE.log("Remembering "+FPE.prettyhexrep(destination_hash), FPE.LOG_VERBOSE)
|
|
|
|
Identity.known_destinations[destination_hash] = [time.time(), packet_hash, public_key, app_data]
|
|
|
|
|
2018-03-19 18:11:50 +01:00
|
|
|
|
|
|
|
@staticmethod
|
2018-03-20 12:32:41 +01:00
|
|
|
def recall(destination_hash):
|
|
|
|
FPE.log("Searching for "+FPE.prettyhexrep(destination_hash)+"...", FPE.LOG_DEBUG)
|
|
|
|
if destination_hash in Identity.known_destinations:
|
|
|
|
identity_data = Identity.known_destinations[destination_hash]
|
|
|
|
identity = Identity(public_only=True)
|
|
|
|
identity.loadPublicKey(identity_data[2])
|
|
|
|
FPE.log("Found "+FPE.prettyhexrep(destination_hash)+" in known destinations", FPE.LOG_DEBUG)
|
|
|
|
return identity
|
|
|
|
else:
|
|
|
|
FPE.log("Could not find "+FPE.prettyhexrep(destination_hash)+" in known destinations", FPE.LOG_DEBUG)
|
|
|
|
return None
|
2018-03-19 18:11:50 +01:00
|
|
|
|
2018-03-19 20:51:26 +01:00
|
|
|
@staticmethod
|
|
|
|
def saveKnownDestinations():
|
|
|
|
FPE.log("Saving known destinations to storage...", FPE.LOG_VERBOSE)
|
|
|
|
file = open(FPE.FlexPE.storagepath+"/known_destinations","w")
|
|
|
|
cPickle.dump(Identity.known_destinations, file)
|
|
|
|
file.close()
|
|
|
|
FPE.log("Done saving known destinations to storage", FPE.LOG_VERBOSE)
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def loadKnownDestinations():
|
|
|
|
if os.path.isfile(FPE.FlexPE.storagepath+"/known_destinations"):
|
|
|
|
file = open(FPE.FlexPE.storagepath+"/known_destinations","r")
|
|
|
|
Identity.known_destinations = cPickle.load(file)
|
|
|
|
file.close()
|
|
|
|
FPE.log("Loaded "+str(len(Identity.known_destinations))+" known destinations from storage", FPE.LOG_VERBOSE)
|
|
|
|
else:
|
|
|
|
FPE.log("Destinations file does not exist, so no known destinations loaded", FPE.LOG_VERBOSE)
|
|
|
|
|
2018-03-19 18:11:50 +01:00
|
|
|
@staticmethod
|
|
|
|
def fullHash(data):
|
|
|
|
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
|
|
|
|
digest.update(data)
|
|
|
|
|
|
|
|
return digest.finalize()
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def truncatedHash(data):
|
2018-03-16 11:40:37 +01:00
|
|
|
digest = hashes.Hash(hashes.SHA256(), backend=default_backend())
|
2018-03-19 18:11:50 +01:00
|
|
|
digest.update(data)
|
2018-03-16 11:40:37 +01:00
|
|
|
|
|
|
|
return digest.finalize()[:10]
|
|
|
|
|
2018-03-19 18:11:50 +01:00
|
|
|
@staticmethod
|
|
|
|
def validateAnnounce(packet):
|
|
|
|
if packet.packet_type == FPE.Packet.ANNOUNCE:
|
2018-03-20 12:32:41 +01:00
|
|
|
FPE.log("Validating announce from "+FPE.prettyhexrep(packet.destination_hash), FPE.LOG_VERBOSE)
|
2018-03-19 18:11:50 +01:00
|
|
|
destination_hash = packet.destination_hash
|
|
|
|
public_key = packet.data[10:Identity.DERKEYSIZE/8+10]
|
|
|
|
random_hash = packet.data[Identity.DERKEYSIZE/8+10:Identity.DERKEYSIZE/8+20]
|
|
|
|
signature = packet.data[Identity.DERKEYSIZE/8+20:Identity.DERKEYSIZE/8+20+Identity.KEYSIZE/8]
|
|
|
|
app_data = ""
|
|
|
|
if len(packet.data) > Identity.DERKEYSIZE/8+20+Identity.KEYSIZE/8:
|
|
|
|
app_data = packet.data[Identity.DERKEYSIZE/8+20+Identity.KEYSIZE/8:]
|
|
|
|
|
|
|
|
signed_data = destination_hash+public_key+random_hash+app_data
|
|
|
|
|
2018-03-19 20:51:26 +01:00
|
|
|
announced_identity = Identity(public_only=True)
|
2018-03-19 18:11:50 +01:00
|
|
|
announced_identity.loadPublicKey(public_key)
|
|
|
|
|
2018-03-20 16:57:26 +01:00
|
|
|
if announced_identity.pub != None and announced_identity.validate(signature, signed_data):
|
2018-03-19 18:11:50 +01:00
|
|
|
FPE.log("Announce is valid", FPE.LOG_VERBOSE)
|
2018-03-20 12:32:41 +01:00
|
|
|
FPE.Identity.remember(FPE.Identity.fullHash(packet.raw), destination_hash, public_key)
|
|
|
|
FPE.log("Stored valid announce from "+FPE.prettyhexrep(destination_hash), FPE.LOG_INFO)
|
|
|
|
del announced_identity
|
|
|
|
return True
|
2018-03-19 18:11:50 +01:00
|
|
|
else:
|
|
|
|
FPE.log("Announce is invalid", FPE.LOG_VERBOSE)
|
2018-03-20 12:32:41 +01:00
|
|
|
del announced_identity
|
|
|
|
return False
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
def exitHandler():
|
|
|
|
Identity.saveKnownDestinations()
|
2018-03-19 18:11:50 +01:00
|
|
|
|
|
|
|
|
2018-03-16 11:40:37 +01:00
|
|
|
def createKeys(self):
|
|
|
|
self.prv = rsa.generate_private_key(
|
|
|
|
public_exponent=65337,
|
|
|
|
key_size=Identity.KEYSIZE,
|
|
|
|
backend=default_backend()
|
|
|
|
)
|
|
|
|
self.prv_bytes = self.prv.private_bytes(
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
format=serialization.PrivateFormat.PKCS8,
|
|
|
|
encryption_algorithm=serialization.NoEncryption()
|
|
|
|
)
|
|
|
|
self.pub = self.prv.public_key()
|
|
|
|
self.pub_bytes = self.pub.public_bytes(
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
|
|
)
|
|
|
|
|
2018-03-20 12:32:41 +01:00
|
|
|
self.updateHashes()
|
2018-03-16 11:40:37 +01:00
|
|
|
|
2018-03-20 12:32:41 +01:00
|
|
|
FPE.log("Identity keys created for "+FPE.prettyhexrep(self.hash), FPE.LOG_INFO)
|
2018-03-16 11:40:37 +01:00
|
|
|
|
|
|
|
def getPrivateKey(self):
|
|
|
|
return self.prv_bytes
|
|
|
|
|
|
|
|
def getPublicKey(self):
|
|
|
|
return self.pub_bytes
|
|
|
|
|
|
|
|
def loadPrivateKey(self, key):
|
|
|
|
self.prv_bytes = key
|
|
|
|
self.prv = serialization.load_der_private_key(self.prv_bytes, password=None,backend=default_backend())
|
|
|
|
self.pub = self.prv.public_key()
|
|
|
|
self.pub_bytes = self.pub.public_bytes(
|
|
|
|
encoding=serialization.Encoding.DER,
|
|
|
|
format=serialization.PublicFormat.SubjectPublicKeyInfo
|
|
|
|
)
|
2018-03-20 12:32:41 +01:00
|
|
|
self.updateHashes()
|
2018-03-16 11:40:37 +01:00
|
|
|
|
|
|
|
def loadPublicKey(self, key):
|
2018-03-20 16:57:26 +01:00
|
|
|
try:
|
|
|
|
self.pub_bytes = key
|
|
|
|
self.pub = load_der_public_key(self.pub_bytes, backend=default_backend())
|
|
|
|
self.updateHashes()
|
|
|
|
except Exception as e:
|
|
|
|
FPE.log("Error while loading public key, the contained exception was: "+str(e), FPE.LOG_ERROR)
|
2018-03-20 12:32:41 +01:00
|
|
|
|
|
|
|
def updateHashes(self):
|
|
|
|
self.hash = Identity.truncatedHash(self.pub_bytes)
|
|
|
|
self.hexhash = self.hash.encode("hex_codec")
|
2018-03-16 11:40:37 +01:00
|
|
|
|
|
|
|
def saveIdentity(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def loadIdentity(self):
|
|
|
|
pass
|
|
|
|
|
|
|
|
def encrypt(self, plaintext):
|
2018-03-20 12:32:41 +01:00
|
|
|
if self.pub != None:
|
2018-03-16 11:40:37 +01:00
|
|
|
chunksize = (Identity.KEYSIZE-Identity.PADDINGSIZE)/8
|
|
|
|
chunks = int(math.ceil(len(plaintext)/(float(chunksize))))
|
|
|
|
|
|
|
|
ciphertext = "";
|
|
|
|
for chunk in range(chunks):
|
|
|
|
start = chunk*chunksize
|
|
|
|
end = (chunk+1)*chunksize
|
|
|
|
if (chunk+1)*chunksize > len(plaintext):
|
|
|
|
end = len(plaintext)
|
|
|
|
|
|
|
|
ciphertext += self.pub.encrypt(
|
|
|
|
plaintext[start:end],
|
|
|
|
padding.OAEP(
|
|
|
|
mgf=padding.MGF1(algorithm=hashes.SHA1()),
|
|
|
|
algorithm=hashes.SHA1(),
|
|
|
|
label=None
|
|
|
|
)
|
|
|
|
)
|
|
|
|
return ciphertext
|
|
|
|
else:
|
2018-03-20 12:32:41 +01:00
|
|
|
raise KeyError("Encryption failed because identity does not hold a public key")
|
2018-03-16 11:40:37 +01:00
|
|
|
|
|
|
|
|
|
|
|
def decrypt(self, ciphertext):
|
|
|
|
if self.prv != None:
|
2018-03-20 16:57:26 +01:00
|
|
|
plaintext = None
|
|
|
|
try:
|
|
|
|
chunksize = (Identity.KEYSIZE)/8
|
|
|
|
chunks = int(math.ceil(len(ciphertext)/(float(chunksize))))
|
|
|
|
|
|
|
|
plaintext = "";
|
|
|
|
for chunk in range(chunks):
|
|
|
|
start = chunk*chunksize
|
|
|
|
end = (chunk+1)*chunksize
|
|
|
|
if (chunk+1)*chunksize > len(ciphertext):
|
|
|
|
end = len(ciphertext)
|
|
|
|
|
|
|
|
plaintext += self.prv.decrypt(
|
|
|
|
ciphertext[start:end],
|
|
|
|
padding.OAEP(
|
|
|
|
mgf=padding.MGF1(algorithm=hashes.SHA1()),
|
|
|
|
algorithm=hashes.SHA1(),
|
|
|
|
label=None
|
|
|
|
)
|
2018-03-16 11:40:37 +01:00
|
|
|
)
|
2018-03-20 16:57:26 +01:00
|
|
|
except:
|
|
|
|
FPE.log("Decryption by "+FPE.prettyhexrep(self.hash)+" failed")
|
|
|
|
|
2018-03-16 11:40:37 +01:00
|
|
|
return plaintext;
|
|
|
|
else:
|
|
|
|
raise KeyError("Decryption failed because identity does not hold a private key")
|
|
|
|
|
|
|
|
|
|
|
|
def sign(self, message):
|
|
|
|
if self.prv != None:
|
|
|
|
signer = self.prv.signer(
|
|
|
|
padding.PSS(
|
|
|
|
mgf=padding.MGF1(hashes.SHA256()),
|
|
|
|
salt_length=padding.PSS.MAX_LENGTH
|
|
|
|
),
|
|
|
|
hashes.SHA256()
|
|
|
|
)
|
|
|
|
signer.update(message)
|
|
|
|
return signer.finalize()
|
|
|
|
else:
|
|
|
|
raise KeyError("Signing failed because identity does not hold a private key")
|
|
|
|
|
2018-03-19 18:11:50 +01:00
|
|
|
def validate(self, signature, message):
|
|
|
|
if self.pub != None:
|
|
|
|
try:
|
|
|
|
self.pub.verify(
|
|
|
|
signature,
|
|
|
|
message,
|
|
|
|
padding.PSS(
|
|
|
|
mgf=padding.MGF1(hashes.SHA256()),
|
|
|
|
salt_length=padding.PSS.MAX_LENGTH
|
|
|
|
),
|
|
|
|
hashes.SHA256()
|
|
|
|
)
|
|
|
|
return True
|
|
|
|
except:
|
|
|
|
return False
|
|
|
|
else:
|
|
|
|
raise KeyError("Signature validation failed because identity does not hold a public key")
|
|
|
|
|
2018-03-20 12:32:41 +01:00
|
|
|
def prove(self, packet, destination):
|
|
|
|
proof_data = packet.packet_hash + self.sign(packet.packet_hash)
|
|
|
|
proof = FPE.Packet(destination, proof_data, FPE.Packet.PROOF)
|
|
|
|
proof.send()
|
2018-03-19 18:11:50 +01:00
|
|
|
|
2018-03-19 20:51:26 +01:00
|
|
|
|
2018-03-20 12:32:41 +01:00
|
|
|
def getRandomHash(self):
|
|
|
|
return self.truncatedHash(os.urandom(10))
|
2018-03-19 20:51:26 +01:00
|
|
|
|